Skip to main content
guest
Join
|
Help
|
Sign In
ACG 6415
Home
guest
|
Join
|
Help
|
Sign In
ACG 6415
Wiki Home
Projects
Recent Changes
Pages and Files
Members
Home
Syllabus - Spring 2018
Schedule - Spring 2018
Class Readings
Class Slides
Access Control Simulation
Course Videos
TYU Solutions
GAO Reports
Security Certifications
Resources
Frameworks & Standards
Threat Statistics
Phishing
Security in the News
Technology Radar
AIS/CPA Exam
Wiki Information
Frameworks & Standards
Edit
28
…
0
Tags
No tags
Notify
RSS
Backlinks
Source
Print
Export (PDF)
Malware Best Practices Controls:
NSA Information Assurance Directorate
Best Practices for Continuity of Operations (Handling Destructive Malware)
- ICT CERT
Table of Contents
Malware Best Practices Controls:
Committee of Sponsoring Organizations of the Treadway Commission (COSO)
Control Objectives for Information and Related Technologies:
ISO 27001:
PCI/DSS:
Information Security Forum:
International Systems Security Certificiation Consortium:
Host Security Baselines and Checklists:
Risk Assessment:
Sarbanes-Oxley:
Committee of Sponsoring Organizations of the Treadway Commission (COSO)
Internal Control - Integrated Framework (1992)
(This is an executive summary of the framework)
Internal Control - Integrated Framework (2011 Exposure Draft)
coso_draft_internal control framework.pdf
Details
Download
2 MB
Internal Control - Integrate Framework (2013, Executive Summary)
990025P_Executive_Summary_final_may20_e.pdf
Details
Download
452 KB
Internal Control over External Financial Reporting (ICEFR):
coso_Internal Control over External Financial Reporting.pdf
Details
Download
2 MB
ICEFR Templates and Examples:
coso_Illustrative_tool.pdf
Details
Download
1 MB
Enterprise Risk Management - Integrated Framework (2004)
(This is an executive summary of the framework)
Developing Key Risk Indicators to strengthen ERM (2010)
2010 Beasley.pdf
Details
Download
2 MB
Enterprise Risk Management for Cloud Computing
Cloud Computing Thought Paper.pdf
Details
Download
6 MB
Control Objectives for Information and Related Technologies:
COBIT 4.1
CobiT_4.1.pdf
Details
Download
2 MB
BMIS (Business Model for Information Security)
BMIS-22Sept2010-Research.pdf
Details
Download
3 MB
ISO 27001:
Mapping from ISO 27001 (2005) to ISO 27001 (2013):
ISO_IEC_27001_2013_vs_2005_v2.0.pdf
Details
Download
914 KB
PCI/DSS:
Draft of V 3.0
Sept-2013-PCI_DSS_v3_DRAFT.pdf
Details
Download
2 MB
Information Security Forum:
Standard of Good Practice (2007)
2007_sogp_pub.pdf
Details
Download
3 MB
International Systems Security Certificiation Consortium:
Common Body of Knowledge
Host Security Baselines and Checklists:
Security Content Automation Protocol
National Checklist Program
Center for Internet Security
CIS_Microsoft_Windows_7_Benchmark_v1.2.0.pdf
Details
Download
2 MB
CIS_Mozilla_Firefox_Benchmark_v1.2.0.pdf
Details
Download
1 MB
CIS_Apple_iOS_Benchmark_v1.4.0.pdf
Details
Download
943 KB
CIS_Apple_OSX_10.6_Benchmark_v1.0.0.pdf
Details
Download
1 MB
Risk Assessment:
OCTAVE Allegro (Guidebook):
OCTAVE Allegro Method v1.0.doc
Details
Download
2 MB
Introducing OCTAVE Allegro: Improving the Information Security Risk Assessment Process (2007):
07tr012.pdf
Details
Download
860 KB
OCTAVE Allegro
OCTAVEv1.0_hospitalexample.pdf
Details
Download
1 MB
Sarbanes-Oxley:
SEC Spotlight on SOX
Guide to SOX
Javascript Required
You need to enable Javascript in your browser to edit pages.
help on how to format text
Turn off "Getting Started"
Home
...
Loading...
Malware Best Practices Controls:
Table of Contents
Committee of Sponsoring Organizations of the Treadway Commission (COSO)
Control Objectives for Information and Related Technologies:
ISO 27001:
PCI/DSS:
Information Security Forum:
International Systems Security Certificiation Consortium:
Host Security Baselines and Checklists:
Risk Assessment:
Sarbanes-Oxley: